Bharat Banate's Work Profile

View Bharat Banate's profile on LinkedIn

Tuesday, March 25, 2008

SAP:-Introduction..

What is SAP?
SAP is the leading Enterprise Information and Management Package worldwide. Use of this package makes it possible to track and manage, in real-time, sales, production, finance accounting and human resources in an enterprise.


SAP the company was founded in Germany in 1972 by five ex-IBM engineers. In case you’re ever asked, SAP stands for Systeme, Andwendungen, Produkte in der Datenverarbeitung which - translated to English - means Systems, Applications, Products in Data Processing. So now you know! Being incorporated in Germany, the full name of the parent company is SAP AG. It is located in Walldorf, Germany which is close to the beautiful town of Heidelberg. SAP has subsidiaries in over 50 countries around the world from Argentina to Venezuela (and pretty much everything in between). SAP America (with responsibility for North America, South America and Australia - go figure!) is located just outside Philadelphia, PA.

SAP Application Modules
SAP has several layers. The Basis System is the heart of the data operations and should be not evident to higher level or managerial users. Other customizing and implementation tools exist also. The heart of the system from a manager's viewpoint are the application modules. These modules may not all be implemented in a typical company but they are all related and are listed below:

*

FI Financial Accounting--designed for automated management and external reporting of general ledger, accounts receivable, accounts payable and other sub-ledger accounts with a user defined chart of accounts. As entries are made relating to sales production and payments journal entries are automatically posted. This connection means that the "books" are designed to reflect the real situation.
*

CO Controlling--represents the company's flow of cost and revenue. It is a management instrument for organizational decisions. It too is automatically updated as events occur.
*

AM Asset Management
--designed to manage and supervise individual aspects of fixed assets including purchase and sale of assets, depreciation and investment management.
*

PS Project System--is designed to support the planning, control and monitoring of long-term, highly complex projects with defined goals.
*

WF Workflow--links the integrated SAP application modules with cross-application technologies, tools and services
*

IS Industry Solutions--combine the SAP application modules and additional industry-specific functionality. Special techniques have been developed for industries such as banking, oil and gas, pharmaceuticals, etc.
*

HR Human Resources--is a complete integrated system for supporting the planning and control of personnel activities.
*

PM Plant Maintenance--In a complex manufacturing process maintenance means more than sweeping the floors. Equipment must be services and rebuilt. These tasks affect the production plans.
*

MM Materials Management--supports the procurement and inventory functions occurring in day-to-day business operations such as purchasing, inventory management, reorder point processing, etc.
*

QM Quality Management--is a quality control and information system supporting quality planning, inspection, and control for manufacturing and procurement.
*

PP Production Planning--is used to plan and control the manufacturing activities of a company. This module includes; bills of material, routings, work centers, sales and operations planning, master production scheduling, material requirements planning, shop floor control, production orders, product costing, etc.
*

SD Sales and Distribution--helps to optimize all the tasks and activities carried out in sales, delivery and billing. Key elements are; pre-sales support, inquiry processing, quotation processing, sales order processing, delivery processing, billing and sales information system
.

KolourPaint: More than a Microsoft Paint clone


Just as Microsoft Paint is included with every Windows installation, so KolourPaint has been part of the kdegraphics package since KDE 3.3. This simple raster graphics editor works well not only in KDE, but also in Xfce, GNOME, and Fluxbox.

Although it started out as a clone of Microsoft Paint, KolourPaint has grown to include more features than its proprietary inspiration. KolourPaint provides tools for image manipulation and icon editing as well as the typical "fingerpainting" that Paint is well known for. KolourPaint's and Paint's interfaces are nearly identical, but hidden behind a simple interface are several advanced features that make it a great graphics editor.

With the release of KDE 4, KolourPaint 4.0 brings some new features to the table, such as a configurable palette, some heavily refactored code, and new image effects that make photo editing a breeze.

Comparisons to Paint
KolourPaint has all the tools that Paint provides, such as the Brush, Color Eraser, Color Picker, Connected Lines/Polyline, Pen, Polygon, Rectangle, and Text to name a few. It also incorporates single-key shortcuts for all its tools to allow for better productivity. One of the handiest improvements over Paint is the number of levels of undo and redo, which, depending on memory usage, may be anywhere from 10 to 500 levels of history. Selections are also fully undo- and redo-able. KolourPaint includes support for freehand resizing and arbitrary rotation angles, and provides a choice between opaque and transparent selections.

[Click to enlarge] Click to enlargeClick to enlarge KolourPaint's Zoomed Thumbnail mode is an excellent addition to the Paint-like genre. It displays a thumbnail version of an image that works similar to an additional view in the GIMP. You can draw on the thumbnail, erase upon it, and use any selection tool on it. The selection tool needs a little more work in the thumbnail ability, as you can't see what contents you are selecting until you let go of the mouse button. You can resize the Zoomed Thumbnail by resizing its window.

KolourPaint provides Color Similarity, which allows you to fill regions in dithered images and photos. In addition to the standard Paint colors, KolourPaint lets you use other color sets (such as the Oxygen Icons in the latest version), or to create your own.

Unlike Paint, KolourPaint can save in every file format that KImageIO can provide; PNG, ICO, and PCX are supported, with the ability preview the images before you load them.

One of the biggest differences between KolourPaint and Paint is the support for transparency. Every KolourPaint tools lets you draw transparent icons and logos on a checkerboard background. This ability helps KolourPaint act as an icon editor too. By filling the workspace with the transparent "color" and resizing the image to a common icon size, you can whip up some catchy icons in a matter of minutes.

Photo editing

KolourPaint is also a useful photo editing application. Like the GIMP, it allows you to autocrop (remove internal borders) and adjust brightness, contrast, and gamma. Operations you can perform include clear, flatten, emboss, flip, and invert with the choice of channels. You can also resize and rotate, reduce colors, reduce images to greyscale, and smooth scale, soften, and sharpen images.

Effects allow you to change the appearance of the image, such as making an image look like it was painted on canvas. You can access effects that appear under the Image menu from the dialog window, as well as those that don't. The Balance effect, which changes the brightness, contrast, and the gamma of an image, is curiously placed in a new dialog window under Image -> More Effects, rather than as an entry in the Image menu. Almost all effects have an easy slider bar that let you change their values, and a thumbnail of the image that automatically updates when you apply an effect.

Anyone looking to fine-tune their graphic skills, or who would like to become more comfortable with KolourPaint, can peruse the KolourPaint Manual. To obtain further support, users can join the KolourPaint Support mailing list.

KolourPaint lacks a few of Paint's features. Some features currently under development include paletted image editing, selectable text, screen depth independence, and image acquisition from a scanner or a camera.

Still, with many of the features that the GIMP contains, and all but a few of Microsoft Paint's features, KolourPaint provides a simple user interface to manipulate photos and create raster graphics. By blending a completed user interface, stable image effects, and innovative features, KolourPaint's developers have put it one step ahead of other Linux Paint clones. As a graphics application, KolourPaint is powerful enough to make even the GIMP respect it.

What is Hacking?

Username: system
Password: manager
Welcome to ABL Computer Research Lab. You have five new messages.
$

That is how easy it was to hack into a computer network. The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

Often attacks are based on software bugs that a hacker can use to give himself or herself super-user status. The example above was used by West German hacker "Pengo" who exploited the fact that many systems came with default usernames and passwords which some buyers neglected to change. He succeeded by persistence.

Also one can get a copy of the password file (which stores usernames and encrypted passwords and is often publicly accessible) and either do a brute-force attack trying all possible combinations, or encrypt a dictionary and compare the results to see if anyone chose a password that is a dictionary word. Another method of hacking is to email someone a program that either automatically runs, or that runs when they click on an attachment. This can install a program that will give you control of their computer. L0pht Heavy Industry’s Back Orifice 2000 (a crude parody of Microsoft’s Office 2000) allows someone to have nearly complete control (running programs, deleting files, viewing the screen, logging typed keys, etc.) over the target computer without being noticed. One complicated method, known as IP spoofing, is to get one computer to pretend that it is another one which is trusted by the target system, thus gaining the access privileges of the latter.

Early hackers needed to be very knowledgeable so that they were able to identify bugs themselves (a task requiring extensive knowledge about the operating system, and reading complex manuals) and often write their own programs to exploit them. They had to keep track of the leading developments in the field (latest bugs, latest patches, latest bugs in the patches, etc.). Later hackers were able to increasingly rely upon the hacking community to identify bugs and write programs that could be adapted for their specific purpose. For instance, famed hacker Kevin Mitnick used a trojan horse written by the West German Chaos Gang to gain access to hundreds of systems. As another example, it does not take much intelligence to download a copy of Back Orifice 2000 from www.bo2k.com and send a copy of the client as an attachment disguised as a game or cute program, to an unsuspecting person. In fact, Back Orifice has been downloaded over 300,000 times (Deane 1999) and received substantial computer media coverage. In Pengo’s case it is often more a matter of dedication and trying well-known recipes until one finds a place that has not fixed the bugs, than genius.

The growing number of inexperienced hackers (deridingly called "lamers" or "crackers"), due to the growth first in BBSes and then in the Internet, helps explain the antagonism between the older generation that did more of the problem-solving for themselves and the new generation that can get a quick start by running hacker programs without understanding how they work. The reaction of the older generation is to shun the newbies, thus ignoring those who might show talent as well as those who are in it just to copy tactics.

Monday, March 24, 2008

VMware Server (for Windows and Linux systems)

VMware Server (for Windows and Linux systems)

Use Multiple Operating Systems Concurrently on the Same PC

VMware Workstation 6 makes it simple to create and run multiple virtual machines on your desktop or laptop computer. You can convert an existing physical PC into a VMware virtual machine, or create a new virtual machine from scratch. Each virtual machine represents a complete PC, including the processor, memory, network connections and peripheral ports.

VMware Workstation lets you use your virtual machines to run Windows, Linux and a host of other operating systems side-by-side on the same computer. You can switch between operating systems instantly with a click of a mouse, share files between virtual machines with drag-and-drop functionality and access all the peripheral devices you rely on.

Take Snapshots & Videos of your Virtual Machines

With Workstation, you can take a “snapshot” that preserves the state of a virtual machine so you can return to it at any time. Snapshots are useful when you need to revert your virtual machine to a prior, stable system state. Workstation displays thumbnails of all your snapshots on a single screen, making it easy for you to track and revert to a previously saved snapshot.

You can even use Workstation 6 to record and play video files that capture all changes to a virtual machine over a period of time. This function is exclusive to VMware Workstation and is incredibly useful for software debugging, Help Desk forensics, sales demonstrations and training.

Run an Entire Multi-tier System on a Single Host Computer

Run multi-tier enterprise applications on a single piece of hardware by managing network-connected virtual machines with the Teams feature of Workstation 6. Teams let you create virtual network environments that include client, server and database virtual machines.

With Workstation Teams, you can turn an entire multi-tier environment on and off with a single click of the mouse button. Workstation displays live thumbnails of all connected virtual machines, enabling you to easily identify and switch between the virtual machines associated with a team.


Broadest Host & Guest Operating System Support

* Runs on both Windows and Linux host operating systems and supports most desktop and server editions of Microsoft Windows, Linux, Solaris x86, Netware, and FreeBSD as guest operating systems
* Supports both 32-bit and 64-bit host and guest operating systems
* Supports two-way Virtual SMP™ – Assign one or two processors to virtual machines
* Experimental support for VMI 3.0 enabled paravirtualized Linux kernels

Click Here To Download VmWare..

How to study SQL Online...

Hello Guys...........

Click on following link and study SQL.You can also fire Query there,no need of having Oracle installed on your machine.

Click Here TO Study SQL Online.

Crontab : Scheduling Tasks

Crontab permits to schedule tasks on your computer. For example you can program a safeguard every month on the 13th, or administrative tasks such as booting tasks (checking emails, log off network stations , etc...).
Keywords: @annually , @daily , @hourly , @midnight , @monthly , @reboot , @weekly , @yearly , command , cron.allow , cron.deny , crontab , Scheduling tasks , user .

We first notice that crontab stands out the at utility. Indeed crontab permits to schedule tasks, that is to say repetitive tasks, whereas at only executes one task.

Allow a user to use crontab


My username is nadir. First you have to allow nadir to use the crontab command. We log in as root and we check if the /etc/cron.allow file exists. If it exists, add the user nadir in the file, if it does not exist create it and add the user nadir.
root@ipower:~# nano -w /etc/cron.allow

or write (vi,gedit, nedit, kwrite, etc...) and fill out the file accordingly.

From now on, the nadir user is allowed to use crontab. So it is possible to specify who are the (users) allowed to use crontab and those who are not allowed. To do that, we use the /etc/cron.allow and /etc/cron.deny files.

If the /etc/cron.allow file exists, only the users mentioned will have the right to use the cron command.

If the /etc/cron.allow file does not exist, it is the /etc/cron.deny file which is taken into account: the mentioned users will not have the right to use the cron command.

If neither of the two files exists, only the super user (root) will have the right to use the cron command.

Note: an empty /etc/cron.deny file means that all the users can use the cron commande.

Use of crontab


Once the nadir user is allowed, this one is able to use crontab. Using the crontab -l option, list the current tasks:
nadir@ipower:~$ crontab -l no crontab for nadir

We can clearly see that no task is defined. Well, it is now or never!

First of all, create a task file
nadir@ipower:~$ crontab -e

Now you had to fill out it. The syntax is: m h dom mon dow command
- m forminute between 0 and 59
- h for hour between 0 and 11
- dom for day of month between 1 and 31
- mon for month between 1 and 12
- dow for day of week between 0 and 7, sunday is represented by 0 or 7, monday by 1, etc ...
- command to execute the command.

Now, take an interest in some special characters (metacharacters) :
- *, if one of the m h dom mon dow fields owns the * character, then it indicates evey minute or evey hour or every day or every day of the month or every month or every day of the week, it depends on which field is placed *.
- / permits to specify a repetition.
- - permits to define a range.
- , permits to specify several values.

Some examples:

*/5 * * * * command to execute a command every 5 minutes.

0 22 * * 1-5 command to execute a command every day, monday to friday, at 10 p.m.

17 19 1,15 * * command means the first and the fifteenth day of the month at 19h17 (7.17 p.m.)

23 0-16/2 * * * command means every 2 hours at the twenty-third minute, between midnight and